26.08.2016 Views

trademark

2c2kIhh

2c2kIhh

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

References<br />

[ABC+07] Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea<br />

Kissner, Zachary N. J. Peterson and Dawn Song. Provable data possession at untrusted<br />

stores. In Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors,<br />

ACM CCS 07: 14th Conference on Computer and Communications Security, pages<br />

598–609. ACM Press, October 2007.<br />

[AGT01] Aris Anagnostopoulos, Michael T. Goodrich and Roberto Tamassia. Persistent<br />

authenticated dictionaries and their applications. Information Security. 379-393.<br />

Springer Berlin Heidelberg, 2001.<br />

[AKS07] Onur Aciiçmez, Çetin Kaya Koç and Jean-Pierre Seifert. Predicting secret keys via<br />

branch prediction. In Masayuki Abe, editor, Topics in Cryptology – CT-RSA 2007, volume<br />

4377 of Lecture Notes in Computer Science, pages 225–242. Springer, February 2007.<br />

[BBS04] Dan Boneh, Xavier Boyen and Hovav Shacham. Short group signatures. In<br />

Matthew Franklin, editor, Advances in Cryptology – CRYPTO 2004, volume 3152 of Lecture<br />

Notes in Computer Science, pages 41–55. Springer, August 2004.<br />

[BF01] Dan Boneh and Matthew K. Franklin. Identity-based encryption from the Weil<br />

pairing. In Joe Kilian, editor, Advances in Cryptology – CRYPTO 2001, volume 2139 of<br />

Lecture Notes in Computer Science, pages 213–229. Springer, August 2001.<br />

[BGN05] Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF formulas on<br />

ciphertexts. In Joe Kilian, editor, TCC 2005: 2nd Theory of Cryptography Conference, volume<br />

3378 of Lecture Notes in Computer Science, pages 325–341. Springer, February 2005.<br />

[BS12] Nitish Balachandran and Sugata Sanyal. A review of techniques to mitigate sybil<br />

attacks. arXiv preprint arXiv: 1207.2617, 2012.<br />

[BSW07] John Bethencourt, Amit Sahai and Brent Waters. Ciphertext-policy attributebased<br />

encryption. In 2007 IEEE Symposium on Security and Privacy, pages 321–334.<br />

IEEE Computer Society Press, May 2007.<br />

[BW07] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on<br />

encrypted data. In Salil P. Vadhan, editor, TCC 2007: 4th Theory of Cryptography<br />

Conference, volume 4392 of Lecture Notes in Computer Science, pages 535–554.<br />

Springer, February 2007.<br />

[CJJ+13] David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin<br />

Rosu and Michael Steiner. Highly-scalable searchable symmetric encryption with<br />

support for Boolean queries. In Ran Canetti and Juan A. Garay, editors, CRYPTO (1),<br />

volume 8042 of Lecture Notes in Computer Science, pages 353–373. Springer, 2013.<br />

CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />

© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />

60

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!